Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.138.3.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.138.3.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:30:18 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 14.3.138.208.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.3.138.208.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
204.48.19.178 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178  user=root
Failed password for root from 204.48.19.178 port 36128 ssh2
Invalid user mars from 204.48.19.178 port 34234
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178
Failed password for invalid user mars from 204.48.19.178 port 34234 ssh2
2019-08-04 05:04:28
42.86.2.56 attack
Aug  3 15:09:11   DDOS Attack: SRC=42.86.2.56 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=47  DF PROTO=TCP SPT=52882 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-04 04:53:42
66.115.168.210 attackbots
Aug  3 17:09:49 vpn01 sshd\[1484\]: Invalid user kaffee from 66.115.168.210
Aug  3 17:09:49 vpn01 sshd\[1484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.115.168.210
Aug  3 17:09:51 vpn01 sshd\[1484\]: Failed password for invalid user kaffee from 66.115.168.210 port 47072 ssh2
2019-08-04 04:40:52
105.73.80.253 attack
2019-08-02T10:07:40.209271WS-Zach sshd[24484]: Invalid user lzhang from 105.73.80.253 port 15158
2019-08-02T10:07:40.212775WS-Zach sshd[24484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.73.80.253
2019-08-02T10:07:40.209271WS-Zach sshd[24484]: Invalid user lzhang from 105.73.80.253 port 15158
2019-08-02T10:07:42.000937WS-Zach sshd[24484]: Failed password for invalid user lzhang from 105.73.80.253 port 15158 ssh2
2019-08-03T13:22:16.501458WS-Zach sshd[2524]: Invalid user test from 105.73.80.253 port 15161
...
2019-08-04 04:35:11
71.237.171.150 attack
Aug  3 22:48:08 srv-4 sshd\[7575\]: Invalid user samba from 71.237.171.150
Aug  3 22:48:08 srv-4 sshd\[7575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.237.171.150
Aug  3 22:48:11 srv-4 sshd\[7575\]: Failed password for invalid user samba from 71.237.171.150 port 49566 ssh2
...
2019-08-04 04:26:46
92.222.71.125 attackspambots
2019-08-03T20:07:57.477722abusebot-7.cloudsearch.cf sshd\[17711\]: Invalid user akai from 92.222.71.125 port 43850
2019-08-04 04:49:10
94.51.47.43 attackbotsspam
Aug  3 18:09:53 www sshd\[26624\]: Invalid user admin from 94.51.47.43
Aug  3 18:09:53 www sshd\[26624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.51.47.43
Aug  3 18:09:55 www sshd\[26624\]: Failed password for invalid user admin from 94.51.47.43 port 47961 ssh2
...
2019-08-04 04:36:58
159.65.14.198 attackbots
WordPress XMLRPC scan :: 159.65.14.198 0.112 BYPASS [04/Aug/2019:01:10:12  1000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 403 5 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-04 04:26:10
123.21.10.213 attackspambots
Aug  3 17:00:15 nexus sshd[24533]: Invalid user admin from 123.21.10.213 port 57563
Aug  3 17:00:15 nexus sshd[24533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.10.213
Aug  3 17:00:17 nexus sshd[24533]: Failed password for invalid user admin from 123.21.10.213 port 57563 ssh2
Aug  3 17:00:17 nexus sshd[24533]: Connection closed by 123.21.10.213 port 57563 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.21.10.213
2019-08-04 04:27:08
187.60.171.34 attackbotsspam
Unauthorised access (Aug  3) SRC=187.60.171.34 LEN=40 TTL=236 ID=27873 DF TCP DPT=8080 WINDOW=14600 SYN
2019-08-04 04:51:29
178.32.215.89 attack
Aug  3 20:43:46 MK-Soft-VM4 sshd\[25581\]: Invalid user stortora from 178.32.215.89 port 59452
Aug  3 20:43:46 MK-Soft-VM4 sshd\[25581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.215.89
Aug  3 20:43:48 MK-Soft-VM4 sshd\[25581\]: Failed password for invalid user stortora from 178.32.215.89 port 59452 ssh2
...
2019-08-04 05:08:38
112.255.141.10 attackbots
Unauthorised access (Aug  3) SRC=112.255.141.10 LEN=40 TTL=50 ID=11133 TCP DPT=23 WINDOW=4117 SYN
2019-08-04 04:38:48
187.62.152.139 attackbotsspam
dovecot jail - smtp auth [ma]
2019-08-04 04:44:40
46.196.250.74 attack
2019-08-03T17:02:04.322273abusebot-6.cloudsearch.cf sshd\[2252\]: Invalid user contabil from 46.196.250.74 port 60890
2019-08-04 04:33:25
201.6.99.139 attackspambots
Aug  3 20:21:30 MK-Soft-VM5 sshd\[22701\]: Invalid user ys from 201.6.99.139 port 40364
Aug  3 20:21:30 MK-Soft-VM5 sshd\[22701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.99.139
Aug  3 20:21:32 MK-Soft-VM5 sshd\[22701\]: Failed password for invalid user ys from 201.6.99.139 port 40364 ssh2
...
2019-08-04 04:53:02

Recently Reported IPs

201.167.196.11 207.104.7.230 136.75.60.19 24.168.136.54
118.104.27.144 196.151.191.238 51.48.213.135 5.97.76.210
26.70.194.187 141.107.126.163 26.96.117.180 80.189.29.241
48.184.230.193 115.156.225.66 209.212.137.177 44.78.104.103
248.237.229.31 117.255.152.166 241.56.167.178 179.75.14.157